Defending your privacy on smartphones or other mobile devices from hackers and data thieves is not easy, actually not even impossible if you have decided to take advantage of special hardware contrivances as well as to install the right tools on. That’s the reason why we are going now to …

Why should anyone ever want to spy on a cell phone at a distance? Well, there could be a lot of reasons for that, actually as we said so many times, to spy on someone’s mobile is illegal. However there are extreme situations, related to the personal sphere, requiring an …

Lately searching for a valid product on the Internet has become a very difficult task. For example, in the case of spy bug transmitters or any other electronic device commonly used in the investigation field, you will note that along with those few old companies, come also across a lot …

The Universidad Politécnica de Madrid has added to the biometric recognition tools already on the market, another ingredient: the body odor. Identification parameter that, according to the researchers may soon be used for a reliable recognition through personal characteristics and biological properties. So we’ll be able to filter people based …

Microregistratori digitali

There are numerous videos on YouTube that show episodes in which people, focused on the smartphone screen, have accidents, only sometimes ridiculous, sometimes with much more serious consequences. It will be they have just received a text message, who are monitoring their partner or who want to know where is their child, at all happened to be distracted by cell phone while there are on the street. Few people stop themselves to handling the tool, the most, distractedly, continuing their own path in haste or simply by habit.

It seems a trivial matter, but if the action is carried out distracted in a busy street or with intense traffic, walk without attention can be really dangerous. The same is true if you pay attention on the phone while you are driving.

Crash Alert is the application for pedestrians that has the aim to reduce the dangerousness of that which could only seem an innocent habit. The app is based on a quite simple technology. It’s a microcamera, equipped with distance sensors, which replaces the eyes of those who are distracted by the phone, scanning the road, and impediments. When it detects one, on the top of the smartphone display appears a bar with a red square. The position of the square indicates the direction in which you risk a collision. According to the first tests with this app you avoid 60 percent of obstacles, without, the percentage drops to 20 percent. Clearly, the special software reduces the dangerousness, but it doesn’t delete it altogether.

In 2008, an American research found that the cases of accidents related to the texting on the street had doubled over the previous year. Some people involved had only the nose or a cheekbone broken against a street lamp or a wall, others had much more serious problems. According to the data relating to the accident of pedestrians, in 59 per cent of cases, the fault is of the distraction for the cellphone.

But it isn’t only the direction of the gaze on the display to generate problems for texting while walking; at the base there is the natural limit of the attention span of human beings. In fact, we can focus our attention only on three different objects. This is the reason that leads a person to crash against a wall, while his attention is absorbed by the smartphone or any other type of tools. In practice, while we are writing a text message, our brain is temporarily unable to engage, in a conscious way, to any other aspect of our reality. So there is no app that can change the nature of man.

They’re coming superheroes, or rather, super powers. After the smart glasses that promise an “augmented reality”, come from England, Eidos, two masks that will enhance sight and hearing. The appearance of the tool is quite aseptic: white plastic and squared traits.

The mask, hearing dedicated, covers mouth and ears as an helmet without the top. Inside there is a directional microphone that allows you to isolate a sound source while a processor analyzes the received sounds and purifies them from any noise. Then, it sends them to the ear through two speakers and a system of bone vibration so you can hear clearly what is happening at several meters away. The mechanism is very similar to that of the most advanced models of directional microphones that from years excellently fulfill the amplifying function for remote listening.

The second mask, sight dedicated, looks like a pair of giant glasses that cover eyes, forehead and cheeks, the parts left uncovered by the other complementary mask. The surface is perforated with holes of different sizes. Under this sheath is placed a tiny camera that takes everything that happens in front of the wearer. An internal processor elaborates the images captured and projected onto a screen allowing you to see a movement in its sequences. The idea seems taken directly from the chrono-photography, photographic technique of the late nineteenth century that allowed you to record moving objects by taking pictures in rapid sequences.

The creators, a group of students from the Royal College of Art in London, expressed the purpose of the masks: to isolate and analyze the information separtaing them from the chaos of everyday life. In a practical sense the applications can be many, from the the medical to entertainment. At a concert, for example, you could hear in a detached manner the performance of a single instrument. Children with attention deficit and hyperactivity disorder could be focused towards the teacher who speaks, calcelling other sounds. And much more.

Beyond aesthetics, very flashy and impractical, the tools are inserted into the modern “wearable” technology. But the prototype isn’t still perfect in form and substance. Fortunately there are useful tools tested and trusted as directional microphones and micro cameras that offer excellent performances at low prices.

With the increasing use by the young people of smartphones, tablets and electronic devices with internet connection, it became necessary to take countermeasures in order to ensure the smooth conduct of tests, exams and competitions. It’s clear the absolute prohibition of any technological aid during the written tests. Obviously the advices of discouragement aren’t enough to inhibit the employ of these tools.

And so the italian school principals have asked to the Minister of Education to assess the possibility to use, in the examination centers, of electronic devices designed to detect the presence of cell phones on or even in stand-by.
Let’s see how they work. These are systems that work with a range of about 30 meters. As soon as they locates a cellphone they can allert in differen ways: with a red light signal, with a sound alarm, or sending a message to the user asking him to turn off the device.

In the case of Endoacustica Cell Detector, the device doesn’t detect only the phones in use (for a conversation or in sending data), but also those are in stand-by mode.
The usage is very simple, suitable even for less experienced teacher. Just a few minutes to set various operating parameters and put it to work immediately, configuring it to your liking the level of sensitivity and volume of the notice. Once in action, its batteries allow a range of use of more than one year, all in a discreet manner, simple and above all, absolutely legal.

In short, students that intended to copy thanks to its smartphones should start studying seriously. In fact we have to contradict students who have judged unreliable these kinds of tools and who believe that it takes months for the delivery of the same. The Endoacustica products are professional and of highest level, used by leading investigative agencies; the same can be found on the website www.endoacustica.com, ordered and delivered in a couple of days.

It’s environmental surveillance, the new frontier crossed by the fish-robot that will be released, in the coming months, in the Thames in order to sniff out pollution.

Scenes like science fiction movies are recorded during the tests in the water. The robots will be released in groups of five in order to provide a mapping of the critical points and pollutant elements. The search will rely to the sensors built-in each of these strange fishes, to the GPS system and a micro camera installed in them, ensuring the exact identification of the area in which they are found. The data will instead be transmitted through Wi-Fi network, used also for a “dialogue” between these fishes-robot. The project has cost about 22,000 euros.

The fish-robot seems like a carp, is one meter and a half and swim at a speed of 1m/s. Every 8 hours back to the base to recharge the batteries and start over.
If the experiment will be successful, the fish may be used to combat seas pollution. The road of fish-robot was follow a few years ago, but the researchers encountered a problem: the previous version wasn’t able to swim on their own. Today, this issue should be resolved.

A team of physicists from Edinburgh promise an imminent revolution in the security field and not only. At the center of their project there is a device able to analyze a vehicle or a particular subject also at a kilometer away.

The technology employed is called the “time of flight” and it has already been adopted for the systems “driverless cars”, but there were problems in perceiving the most distant objects. And the precision at long distance is just the characteristic of pride of the new product that exalts the probabilty of error at most an millimeter.

Let’s see how it works: the object that you want to investigate is hit by an infrared laser beam at low-voltage and according to the “time of flight”, so to the lightspeed of return (in addition to an image processing software), it makes a very accurate reconstruction.

The creators hope to develop a range of action of 10 km, if they will obtain the permission to proceed, and clearly also the necessary funding. Always the scanner designers believe that, thanks to future corrections on the image processor, it will possible to measure the speed and the direction of an object. The tool will certainly have uses in the military field, in areas of war or to prevent the risk of terrorism.

There is still a limit in the use of the scanner: it doesn’t detect the human skin because it reacts differently once it has hit by a laser, compared to other materials, leaving an image unclear. So to keep under control at long-distance humans and their movements will we have to make use of GSM bugs, tools that allow you to listen from any distance and that, through powerful software, also offer the possibility of eliminating any external noise. In short, the field of security and surveillance no longer knows boundaries of both time and space.

The desire to monitor their children in the digital age is becoming more insistent. With the opening of virtual borders in the life of a child come many opportunities, but also many threats. Monitoring tools for pc as key recorder or key hunter, for example, help parents to verify what happens in the virtual life of their children, often avoiding episodes of bullying.

An American company specialized in digital texts in the last months has launched a software that “spy” study habits through the e-reader. These tools are becoming increasingly common in the education world, but can lead to unpleasant implications for the privacy of the students going to control their habits of reading and underlining.

The software operates on the cloud, so every time a student access to the text, the pages read are recorded and tracked as in the case of the pages of a website. The “Big Brother of education” provides to the teachers the average length of the time spent on virtual books and can tell if the subject underlines or takes notes on the tablet or e-reader.

In this way, the control screen will show if a member of the class is behind and what are the topics on which he has had problems. The instrument meets the needs of big classes where the teachers cannot monitor individual pupils and however doesn’t replace tests and queries. On the other hand we must also recognize that everyone has their own method of study and there are those who is able to assimilate in a short time or those who prefer integrate more with the sheets of paper and then penalize them would not be fair. And you can also leave open a page without really reading it.

In short, the system still leaves some shadow areas and cannot find an application to 360°. Regarding the tracking of the habits and preferences of the readers on web browsing, this is an operation already done by giants like Google or Amazon.

In the U.S. everybody wants a drone, many civil administrations have request them. The Federal Aviation Administration is looking for six sites where realize tests to the use of drones (unarmed) in national territory and it has received offers from numerous organizations from 37 states. There isn’t money for the project, but most of the proponents believe in future applications in the security field to show that, in the fight against crime, they are unbeatable.

The idea is to use the drones to observe with bird’s-eye view the cities, but in different parts of the U.S. there is a high intensity of air traffic and drones could pose a danger. Added to this are the issues related to privacy and intrusiveness of government in the private lives of citizens. Over time, it’s clear the risk of abuses of all kinds: the drones will end up into the hands of anybody and they could be used in private. Excellent video surveillance systems have been already adopted by many administrations without having the need of drones and damming, in the same way, incidents of crime.

There isn’t doubt, instead, about the drones success in military field. From the entry in office of Obama to now, the robots have taken part in many military campaigns, including Yemen, Somalia, Afghanistan, killing many victims. In Pakistan, the drones are controlled directly by the CIA. More than half of American citizens appreciate the fact that the soldiers in the flesh and blood don’t risk their lives.

In short, the unmanned aircrafts attract the attention of many countries that haven’t the resources to manage air force. The Americans obviously are advantaged and they are keen to remain so; they don’t exclude the application in other fields such as marine or forestry.

There remain many shadows about the use of drones in the field of civil security. At the moment exist on the market powerful video surveillance systems that have little or nothing to envy to the robot and, above all, they don’t jeopardize the privacy of citizens.

The USA Department of Homeland Security searching for about 600 hackers to employ in the next years to reinforce the digital defence of the country. The research is part of a program to discover young talents that emerge from software competitons, real challenges of computer security and creativity.

In reality isn’t the first time that United States are looking for “border line” people to involve in the security field. Also others agencies are searching for informatic experts to enrich their activities.
This need arises from the continuous increase of cyber crime that endangers the existence of institutions, public and private companies. The intrusion in database and unauthorized access to reserved information taking place every day and provide huge damages to the businesses.

Many companies had adopted security systems for PC and make regular environmental bug sweeps to verify the presence of any bugs or other hacking and control systems. Only in this manner they can prevent leakage of data, and the consequent losses.

According to the estimates of McAfee, large computer security company, the potential damage caused by cybercrime and by data loss amounted at $4.6 million on average for each company in a sample examined by a study in collaboration with Purdue University. The telecommunications giant At&t estimates that the U.S. companies will double or triple the cost of digital defenses.

Last summer, the National Security Agency has even sent some talent scouts to a famous conference of hackers, Defcon, so to enter step by step in a particular world. But on the best digital experts don’t bet only the U.S., but also many other nations. Recently ended in the United Kingdom, the third edition of the Cyber ​​Security Challenge: the competition included the work on a software application with mathematical formulas of encryption that protect business communications.
At the moment to help companies and institutions there are only self-defence tools.

Data leaks, confidential information solds to competitors, patents missed for the fault of unfaithful employees: This is the current situation in many companies in the world. The strong crisis “obliges” every day millions of employees to sell themselves to competitors in exchange for large sums of money or favors professional.

At the other side, the smartest companies have adopted valid surveillance systems both for the environmental monitoring of what is happening in the company, and as regards the informatic security. Through invisible pc devices you can monitor the work of your employees and prevent intrusion attempts. In fact, shouldn’t be underestimated even the threats of hacking. In unnoticed way, through sophisticated algorithms, it’s possible enter into business Pcs and stealing information and important data. It isn’t useful now constantly change passwords.

To give an answer to the need for informatic security, in addition to powerful tools previously mentioned, could come in the next years a computer that is controlled by gestures. And that’s not all. It seems that it will no longer need to type the password because this will be read directly from the user’s mind; for this reason, the name “passthought”.

The project of the UC Berkeley School of Information explores the feasibility of brainwave-based computer authentication as a substitute for passwords. The research team used a device, an helmet, already tested, that works through the non-invasive EEG features. The device is connected via Bluetooth to a computer that can decipher the brainwaves. During the test has been asked to several people to imagine to make a specific actions, such as moving a finger or sing a song. In all cases (with an error level of less than 1%) it was possible use the brain waves to identify the actions accurately. Clear, at this point, the possible application in the world of passwords.

This type of research lies in the biometric authentication field which already offers wide applications in various areas. Just think of the locks to fingerprints. Going beyond the physical tools and the classic alphanumeric combinations it will be possible a higher level of security, at least for now!

The dream of many drivers could become reality. Travel miles and miles without concerns and in safety it might be possible with the car that drives itself, or rather, the car without driver.

To lead the project is a team of researchers from the University of Oxford that has developed a model that, using cameras and laser, is able to move autonomously in traffic, without requiring that the person at the wheel do anything and without even the need somebody to be sitting in the driver’s seat. This type of car is ideal for those who repeat the same route every day, for example, to go to work or to accompany children to school. In any case, the human pilots can resume anytime the vehicle driving, simply by touching the brake pedal with your foot and then turning off the autopilot.

At the moment there are still some limitations: the prototype “doesn’t know the road” so it’s necessary that a human teaches the path so that the cameras installed on the car record it on a dedicated computer or on an iPad. Once the route has been stored out of the car, just plug it in again, as you would with a navigation system, and the “automatic pilot” repeats exactly the same.
A system of laser beams, naturally, probe the road in search of all kinds of obstacles: other vehicles, pedestrians, dams, and softly presses the brake until it stops if it finds one, restarting only when the obstacle is no longer visible on its screens. Also today the cost of the new technology is quite high, about 5000 pounds (about 6000 euro), but the English experts think that in a short time the price will drop down to ￡ 100 (120 Euros).

So we still have to wait and in the meantime make use of valid measures in support of our safety on the road. An example is definitely the anti sleep driving alarm of Endoacustica Europe which drastically reduces the risk of accidents caused by tiredness and sleep. The device is positioned above the ear and, in the case in which the head is inclined more than 30 degrees, it starts to produce a loud sound that gives the driver quickly to reality. The product is already available for purchase online from the website www.endoacustica.com, in the section “Self Defense”.

Text ADS

A Spy Phone or GSM spy cellphone is a normal mobile phone on which has been installed a software able to reply many crucial information such as: listening of all incoming and outgoing calls from the mobile, real time phone surrounding sounds, reading of all type of messages (SMS, WhatsApp, Facebook, Viber etc..) and GPS tracking. The spy software works on the most of Android, iOS, Blackberry smartphones.

Micro digital recorder able to gather evidence or discover any kind of betrayals. Recording capability of up to 1200 hours in continuous. Long duration for those recorders using voice activation system VAS. Just for you the best micro digital voice recorders on the market in terms of efficacy and reliability at a low price.

Wall microphones able to listen through walls thick even up to 70 cm.
Ultra sensitive professional stereo microphone, suitable to pick up the lowest noises thanks to its very high sensitive ceramic microphone. Limpid and stable sound. Endowed with sockets for recorder and earpiece.

The phone voice changers when interposed between handset and phone, will change your voice into another one. It transforms any voice into a masculine, feminine, adult or child one.The voice changer can be adapted to cell phones, cordless phones, speakers and microphones, recording systems, or connected to switchboards. The reproduced voice is not a robotic but a human one.

This may be the last discover of ingenious thieves who don’t hesitate to resort to the technology to hit unsuspecting victims. The news of recent months shows several cases where someone complains of being robbed, at home or in the company, after agreeing to unknowns small gadgets, deployed on the street, particularly at the crossings or when the light is red. The hypothesis is that these gadgets (lighters, key chains …

The geolocation is getting closer, at your fingertips. We’re all constantly losing things. Keys, bag, charger and many other tools of daily use are very often forgotten, lost. The hard part is finding them. This discomfort could be deleted with the help of geolocation devices. In particular, big companies and startups are trying to answer to the distraction effects with products that will come soon on the market. Their secret would be an accessory, …

One hundred twenty thousand a year, ten thousand a month are the mobile phones stolen (or loss). These are the numbers from the homeland of mobile phones, smartphones and tablets thieves: London. The Mayor, Boris Johnson, and the police are really troubled about the weight of these statistics and asked to the same companies devices producing to investigate about what is happening. In particular, they asked to Apple, Samsung and …

Locate the exact position of a cell phone in enclosed spaces may become possible thanks to an algorithm that allows us to reconstruct the 3D shape of a room, listening to the echo of the sounds produced inside, even simple ones like the snap of the fingers. The project was developed by a research group at the EPFL. The researchers were inspired by echolocation, the system by which some animals …

It’s environmental surveillance, the new frontier crossed by the fish-robot that will be released, in the coming months, in the Thames in order to sniff out pollution. Scenes like science fiction movies are recorded during the tests in the water. The robots will be released in groups of five in order to provide a mapping of the critical points and pollutant elements. The search will rely to the sensors built-in …

GPS technology has now numerous applications in daily activities. Keep an eye on the kids, monitor the pet, follow the partner’s car is a cakewalk if you have the right tools. Shortly, it will possible use a sophisticated development of GPS technology in a shopping center or on the shelves of the supermarket so you’ll save time and optimize the product comparison. To lead the tour will be our trusty …

Web 3.0 isn’t yet far away. All the big laboratories are working hard to develop new applications concerning the Internet of things. With this neologism has been named the last frontier of online technology. The strength lies in the possibility given to objects to interact with each other by capturing and exchanging information. The alarm clock may sound for example in advance once found, through the Internet, heavy traffic conditions. …

Pack your bags is always a problem. Weather conditions, formal and informal dresses, comfortable and casual, but also suited to special occasions that may occur…In short, a grind. And what often we create is a baggage too heavy and almost entirely useless. About 25 years ago, a pilot of the Nortwestern Airlines tried to obviate to the problem of having to lift heavy luggage introducing the trolley as we know …

Until recently, GPS tracking systems were used for the control of small animals. Now the GPS challenges even the most dangerous animals. Indeed, it is in an experimental phase the scientific mission of the American non profit association, Ocearch, led by Chris Fischer. During the operation, the sharks are caught, mainly in North America, and to them is applied a GPS tracking device, then they come back to the sea. …

Dominic Wilcox, british designer, has created a fully functional prototype pair of shoes with a built-in GPS that will guide you home. The name of this extravagant invention is “No Place Like Home” and it’s inspired by the famous novel “The Wonderful Wizard of Oz” in witch the protagonist Dorothy, with her magic shoes, can go everywhere clicking her shoes together three times. For Wilcox’s shoes, with expertly decorated sole, …